Target and Other Retailers Unite to Share Cyberthreat Ddata

Some of the biggest U.S. retailers have banded together to share information about cyberthreats, in a bid to avert breaches like that suffered by Target last holiday season. Target, The Gap, Walgreens and J.C. Penney are among the members of the group, which will share real-time threat information with each other and with the Department … Continue reading

Google Patches Major Glass QR Code-Triggered Exploit

Google has quietly patched a Glass security exploit that could have allowed hackers to take control of the wearable by showing it a QR code, the researcher who identified the flaw tells SlashGear. The exploit, discovered by Marc Rogers, Principal Security Researcher at Lookout Mobile Security, took advantage of Glass’ streamlined setup process that saw … Continue reading

Google’s ‘Back Up My Data’ Gives the NSA and FBI Easy Access to Your Passwords

If you’re using Google’s “back up my data” feature for Android, the passwords to the Wi-Fi networks you access from your smartphone or tablet are available in plaintext to anyone with access to the data. And as a bug report submitted by an employee of the Electronic Frontier Foundation (EFF) on July 12 suggests, that … Continue reading

Google Drive is Testing Encryption to Protect Your Files From the NSA

Google has begun experimenting with encrypting Google Drive files, a privacy-protective move that could curb attempts by the U.S. and other governments to gain access to users’ stored files. Two sources told CNET that the Mountain View, Calif.-based company is actively testing encryption to armor files on its cloud-based file storage and synchronization service. One … Continue reading

Apple’s Dev Site Gets Hacked, Prompts ‘Complete Overhaul’

Apple’s developer website has been down for days, and the company has just confirmed in an email that “an intruder” attempted to access personal information from its registered developers. In the email sent to its developers, Apple writes that “sensitive personal information was encrypted and cannot be accessed.” But despite the claim that no sensitive … Continue reading